Does the kernel stack pointed to by task_struct->task get a VMA during do_execve() ? If not, how does the kernel prevent user-space from using the virtual address range used by the kernel-space ?
Does the kernel stack pointed to by task_struct->task get a VMA during do_execve() ? If not, how does the kernel prevent user-space from using the virtual address range used by the kernel-space ?